Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CB5830 second address: 0000000002CB592B instructions: 0x00000000 rdtsc 0x00000002 rol ebp, 00000000h 0x00000005 jmp 00007F6A109899F6h 0x00000007 jl 00007F6A10989A46h 0x00000009 bt ebx, eax 0x0000000c mov bl, byte ptr [esp] 0x0000000f bswap edx 0x00000011 mov ax, word ptr [esp] 0x00000015 mov dl, 43h 0x00000017 mov ax, 8824h 0x0000001b clc 0x0000001c jmp 00007F6A10989B7Eh 0x00000021 jc 00007F6A10989965h 0x00000027 jnc 00007F6A1098995Fh 0x0000002d lea esp, dword ptr [esp+04h] 0x00000031 neg ebp 0x00000033 mov bh, byte ptr [esp] 0x00000036 rol al, 00000007h 0x00000039 jmp 00007F6A10989A8Bh 0x0000003b jne 00007F6A10989A4Dh 0x0000003d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CB7AB0 second address: 0000000002CB7AB4 instructions: 0x00000000 rdtsc 0x00000002 xchg ah, dh 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC3D27 second address: 0000000002CC3EB2 instructions: 0x00000000 rdtsc 0x00000002 mov dh, byte ptr [esp] 0x00000005 jmp 00007F6A109899D1h 0x00000007 pushfd 0x00000008 push dword ptr [esp+04h] 0x0000000c retn 0008h 0x0000000f lea esp, dword ptr [esp+03h] 0x00000013 jmp 00007F6A10989ABFh 0x00000018 add esi, 04h 0x0000001b mov ax, word ptr [esp] 0x0000001f setb dh 0x00000022 xchg dl, ah 0x00000024 jmp 00007F6A109899EDh 0x00000026 push edi 0x00000027 mov ah, byte ptr [esp] 0x0000002a xchg edi, eax 0x0000002c push ecx 0x0000002d jmp 00007F6A10989A36h 0x0000002f push esi 0x00000030 xchg bl, al 0x00000032 dec bh 0x00000034 jp 00007F6A10989AAEh 0x00000036 mov ecx, ebx 0x00000038 jmp 00007F6A10989A94h 0x0000003a mov ah, byte ptr [esp] 0x0000003d mov dx, 5C02h 0x00000041 xor dx, 3A64h 0x00000046 jmp 00007F6A10989D77h 0x0000004b jbe 00007F6A10989A9Bh 0x0000004d jnbe 00007F6A10989A99h 0x0000004f push esi 0x00000050 mov esi, 54CE0987h 0x00000055 xor bl, ch 0x00000057 jbe 00007F6A10989853h 0x0000005d ja 00007F6A1098984Dh 0x00000063 call 00007F6A109899B4h 0x00000068 pop edi 0x00000069 jmp 00007F6A109898FBh 0x0000006e lea edi, dword ptr [00000000h+eax*4] 0x00000075 lea eax, dword ptr [00000000h+esi*4] 0x0000007c setle al 0x0000007f inc al 0x00000081 js 00007F6A109899FEh 0x00000083 jns 00007F6A109899FCh 0x00000085 jmp 00007F6A10989B51h 0x0000008a pop edi 0x0000008b mov edx, 9C6E709Dh 0x00000090 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CAFAF6 second address: 0000000002CAFCBF instructions: 0x00000000 rdtsc 0x00000002 pop dx 0x00000004 jmp 00007F6A109670E8h 0x00000006 xchg eax, edx 0x00000007 dec ax 0x00000009 jno 00007F6A10967097h 0x0000000b xchg al, ah 0x0000000d mov ax, bp 0x00000010 lea esp, dword ptr [esp+02h] 0x00000014 jmp 00007F6A109670C6h 0x00000016 add bl, 00000011h 0x00000019 mov ax, 9BD1h 0x0000001d mov eax, EC020B0Fh 0x00000022 mov al, byte ptr [esp] 0x00000025 xchg al, ah 0x00000027 jmp 00007F6A1096721Dh 0x0000002c lea edx, dword ptr [ebx-000000E2h] 0x00000032 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CAFCBF second address: 0000000002CAFBA8 instructions: 0x00000000 rdtsc 0x00000002 dec bl 0x00000004 mov dl, 6Ah 0x00000006 lea edx, dword ptr [00000000h+eax*4] 0x0000000d jmp 00007F6A1098990Ch 0x00000012 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D008B3 second address: 0000000002D0092A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A109670D0h 0x00000004 sub ebp, 02h 0x00000007 neg ah 0x00000009 jmp 00007F6A109670FEh 0x0000000b jo 00007F6A10967068h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D0092A second address: 0000000002D0094B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A109899E6h 0x00000004 movzx ebx, byte ptr [esi] 0x00000007 sub esp, 0Ah 0x0000000a jmp 00007F6A10989AE5h 0x0000000f jl 00007F6A109899A5h 0x00000015 xchg dword ptr [esp+01h], eax 0x00000019 pop word ptr [esp] 0x0000001d jmp 00007F6A109899F5h 0x0000001f mov dx, word ptr [esp] 0x00000023 mov dh, ah 0x00000025 sub esp, 10h 0x00000028 jmp 00007F6A109899FEh 0x0000002a lea esp, dword ptr [esp+0Fh] 0x0000002e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCF002 second address: 0000000002CCF00A instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [edi-6350673Ch] 0x00000008 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCF00A second address: 0000000002CCEDBB instructions: 0x00000000 rdtsc 0x00000002 neg eax 0x00000004 jns 00007F6A10989825h 0x0000000a js 00007F6A1098981Fh 0x00000010 jmp 00007F6A109899DAh 0x00000012 mov ebx, esi 0x00000014 mov edx, dword ptr [ebx] 0x00000016 mov ah, al 0x00000018 mov eax, dword ptr [esp] 0x0000001b jmp 00007F6A109899CCh 0x0000001d mov bl, byte ptr [esi+04h] 0x00000020 clc 0x00000021 jc 00007F6A10989A16h 0x00000023 mov ah, byte ptr [esp] 0x00000026 jmp 00007F6A10989A14h 0x00000028 call 00007F6A10989A6Bh 0x0000002d mov dword ptr [esp], eax 0x00000030 jmp 00007F6A10989A10h 0x00000032 sub esi, 02h 0x00000035 mov eax, 22755878h 0x0000003a mov ax, 5CECh 0x0000003e mov ah, cl 0x00000040 jmp 00007F6A10989A5Ah 0x00000042 xchg ebx, ecx 0x00000044 lea eax, dword ptr [eax+edi] 0x00000047 lea eax, dword ptr [00000000h+eax*4] 0x0000004e mov ah, byte ptr [esp] 0x00000051 jmp 00007F6A10989A0Bh 0x00000053 shl edx, cl 0x00000055 lea eax, dword ptr [00000000h+edx*4] 0x0000005c push bp 0x0000005e mov byte ptr [esp], bl 0x00000061 jmp 00007F6A10989A73h 0x00000063 lea esp, dword ptr [esp+02h] 0x00000067 xchg ebx, ecx 0x00000069 mov eax, esp 0x0000006b xchg al, ah 0x0000006d lea eax, dword ptr [ebx-000082EAh] 0x00000073 jmp 00007F6A10989A08h 0x00000075 mov dword ptr [esi+04h], edx 0x00000078 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC9DA4 second address: 0000000002CC9DF6 instructions: 0x00000000 rdtsc 0x00000002 dec ebp 0x00000003 jmp 00007F6A10967033h 0x00000005 mov ax, word ptr [esp] 0x00000009 btc dx, si 0x0000000d jmp 00007F6A109670F8h 0x0000000f jnbe 00007F6A1096706Eh 0x00000011 mov ah, byte ptr [esp] 0x00000014 lea edx, dword ptr [00000000h+eax*4] 0x0000001b mov eax, dword ptr [esp] 0x0000001e add dx, 7A10h 0x00000023 not ah 0x00000025 mov edx, edi 0x00000027 jmp 00007F6A1096714Dh 0x0000002c inc dx 0x0000002e jnle 00007F6A10967098h 0x00000030 not edx 0x00000032 mov edx, dword ptr [esp] 0x00000035 jmp 00007F6A109670CCh 0x00000037 not bl 0x00000039 bt edx, eax 0x0000003c jle 00007F6A10967091h 0x0000003e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC9DF6 second address: 0000000002CC9EAA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A10989AB9h 0x00000007 setnle dl 0x0000000a setns dl 0x0000000d cmp edx, esi 0x0000000f jmp 00007F6A10989A00h 0x00000011 mov edx, dword ptr [esp] 0x00000014 neg bl 0x00000016 bswap edx 0x00000018 rcl eax, 07h 0x0000001b jmp 00007F6A10989A36h 0x0000001d jnbe 00007F6A10989A0Ah 0x0000001f mov ax, word ptr [esp] 0x00000023 shl edx, 19h 0x00000026 jmp 00007F6A10989A65h 0x00000028 mov edx, dword ptr [esp] 0x0000002b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC4149 second address: 0000000002CC41B4 instructions: 0x00000000 rdtsc 0x00000002 call 00007F6A1096710Ah 0x00000007 lea edx, dword ptr [ebx+ebp] 0x0000000a mov bx, bp 0x0000000d jmp 00007F6A10967094h 0x0000000f lea ebx, dword ptr [esi-0000FFF0h] 0x00000015 xchg dword ptr [esp], edi 0x00000018 mov eax, 56ACE388h 0x0000001d jmp 00007F6A109670D6h 0x0000001f mov dx, bx 0x00000022 lea edi, dword ptr [edi+23h] 0x00000025 mov al, 71h 0x00000027 not ebx 0x00000029 sub esp, 18h 0x0000002c add esp, 15h 0x0000002f jmp 00007F6A1096708Ah 0x00000031 lea esp, dword ptr [esp+03h] 0x00000035 xchg dword ptr [esp], edi 0x00000038 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC41B4 second address: 0000000002CB5830 instructions: 0x00000000 rdtsc 0x00000002 dec edx 0x00000003 mov ebx, ecx 0x00000005 mov edx, esp 0x00000007 jmp 00007F6A10989B35h 0x0000000c push dword ptr [esp] 0x0000000f retn 0004h 0x00000012 call 00007F6A10989A18h 0x00000017 pop ax 0x00000019 lea esp, dword ptr [esp+02h] 0x0000001d jmp 00007F6A10989AD4h 0x00000022 mov ebp, dword ptr [esi] 0x00000024 bswap ebx 0x00000026 neg dx 0x00000029 jnle 00007F6A10989A13h 0x0000002b shl bh, 00000000h 0x0000002e mov edx, esi 0x00000030 jmp 00007F6A10989A62h 0x00000032 add esi, 04h 0x00000035 dec bx 0x00000037 jnbe 00007F6A10989A15h 0x00000039 lea ebx, dword ptr [05B59A4Ah] 0x0000003f call 00007F6A10989A53h 0x00000044 jmp 00007F6A1097AF8Eh 0x00000049 mov ecx, ebp 0x0000004b bsr bx, dx 0x0000004f jo 00007F6A109899FFh 0x00000051 mov dx, word ptr [esp] 0x00000055 mov edx, 0D44127Fh 0x0000005a xchg ax, dx 0x0000005c jmp 00007F6A10989A40h 0x0000005e not ebx 0x00000060 push ebp 0x00000061 jmp 00007F6A10989A4Dh 0x00000063 mov edx, eax 0x00000065 neg dh 0x00000067 jc 00007F6A10989ACFh 0x0000006d jmp 00007F6A109899E0h 0x0000006f setb al 0x00000072 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC0342 second address: 0000000002CC0373 instructions: 0x00000000 rdtsc 0x00000002 xchg bl, dl 0x00000004 clc 0x00000005 jo 00007F6A109670C7h 0x00000007 jno 00007F6A109670C5h 0x00000009 push ebp 0x0000000a jmp 00007F6A109670B6h 0x0000000c lea ebp, dword ptr [ebx+000000F6h] 0x00000012 lea ecx, dword ptr [edx-6BD77D8Ah] 0x00000018 mov ebx, edi 0x0000001a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC9D23 second address: 0000000002CC9DF6 instructions: 0x00000000 rdtsc 0x00000002 call 00007F6A109899DFh 0x00000007 mov dl, CCh 0x00000009 mov eax, dword ptr [esp] 0x0000000c mov eax, dword ptr [esp] 0x0000000f lea edx, dword ptr [esp+ebp] 0x00000012 jmp 00007F6A10989A0Fh 0x00000014 xchg dword ptr [esp], ebp 0x00000017 sub esp, 0Eh 0x0000001a stc 0x0000001b call 00007F6A10989A62h 0x00000020 lea eax, dword ptr [esp+eax] 0x00000023 push dword ptr [esp+11h] 0x00000027 lea esp, dword ptr [esp+02h] 0x0000002b jmp 00007F6A10989A0Fh 0x0000002d lea ebp, dword ptr [ebp+7Ch] 0x00000030 push sp 0x00000032 rcl eax, cl 0x00000034 mov dh, byte ptr [esp] 0x00000037 xchg dh, dl 0x00000039 lea esp, dword ptr [esp+02h] 0x0000003d jmp 00007F6A10989A43h 0x0000003f xchg dword ptr [esp+14h], ebp 0x00000043 mov dl, byte ptr [esp] 0x00000046 xchg dh, dl 0x00000048 mov ah, 8Dh 0x0000004a push dword ptr [esp+14h] 0x0000004e retn 0018h 0x00000051 dec ebp 0x00000052 jmp 00007F6A109899B3h 0x00000054 mov ax, word ptr [esp] 0x00000058 btc dx, si 0x0000005c jmp 00007F6A10989A78h 0x0000005e jnbe 00007F6A109899EEh 0x00000060 mov ah, byte ptr [esp] 0x00000063 lea edx, dword ptr [00000000h+eax*4] 0x0000006a mov eax, dword ptr [esp] 0x0000006d add dx, 7A10h 0x00000072 not ah 0x00000074 mov edx, edi 0x00000076 jmp 00007F6A10989ACDh 0x0000007b inc dx 0x0000007d jnle 00007F6A10989A18h 0x0000007f not edx 0x00000081 mov edx, dword ptr [esp] 0x00000084 jmp 00007F6A10989A4Ch 0x00000086 not bl 0x00000088 bt edx, eax 0x0000008b jle 00007F6A10989A11h 0x0000008d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC9027 second address: 0000000002CC9124 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [00000000h+esi*4] 0x00000009 xchg dword ptr [esp+18h], ecx 0x0000000d xchg dh, ah 0x0000000f dec ah 0x00000011 call 00007F6A10967083h 0x00000016 lea esp, dword ptr [esp+02h] 0x0000001a jmp 00007F6A109670F4h 0x0000001c lea esp, dword ptr [esp+02h] 0x00000020 push dword ptr [esp+18h] 0x00000024 retn 001Ch 0x00000027 mov ebx, dword ptr [ebp+00h] 0x0000002a bt dx, sp 0x0000002e jnc 00007F6A10967104h 0x00000030 jc 00007F6A1096712Eh 0x00000032 and edx, FD9B4CC2h 0x00000038 bsr ax, si 0x0000003c lea eax, dword ptr [edx+ebp] 0x0000003f jmp 00007F6A109670C4h 0x00000041 mov dl, byte ptr [ebp+04h] 0x00000044 lea eax, dword ptr [00000000h+eax*4] 0x0000004b mov eax, esi 0x0000004d sub ebp, 02h 0x00000050 jmp 00007F6A1096722Eh 0x00000055 shr eax, cl 0x00000057 jc 00007F6A10967032h 0x00000059 bt ax, si 0x0000005d ror ah, cl 0x0000005f and ax, ax 0x00000062 jmp 00007F6A10966F7Fh 0x00000067 xchg edx, ecx 0x00000069 not ax 0x0000006c jmp 00007F6A1096707Eh 0x0000006e shl ebx, cl 0x00000070 not eax 0x00000072 mov al, byte ptr [esp] 0x00000075 mov ax, word ptr [esp] 0x00000079 xchg edx, ecx 0x0000007b jmp 00007F6A109670B6h 0x0000007d mov ax, 3D73h 0x00000081 jmp 00007F6A10967120h 0x00000083 mov dword ptr [ebp+04h], ebx 0x00000086 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC9124 second address: 0000000002CAF028 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [ecx+ecx] 0x00000005 xchg dl, ah 0x00000007 setbe al 0x0000000a jmp 00007F6A109899E6h 0x0000000c pushfd 0x0000000d pop dword ptr [ebp+00h] 0x00000010 lea eax, dword ptr [00000000h+eax*4] 0x00000017 mov ebx, dword ptr [esp] 0x0000001a jmp 00007F6A10989A0Ch 0x0000001c lea ebx, dword ptr [ecx+000000BAh] 0x00000022 mov dx, word ptr [esp] 0x00000026 jmp 00007F6A10989A62h 0x00000028 mov dx, di 0x0000002b mov bl, CCh 0x0000002d sub esp, 13h 0x00000030 jnc 00007F6A10989A12h 0x00000032 jmp 00007F6A10989A82h 0x00000034 push word ptr [esp+0Dh] 0x00000039 lea esp, dword ptr [esp+01h] 0x0000003d lea edx, dword ptr [edi+50h] 0x00000040 lea ebx, dword ptr [edi+17h] 0x00000043 push ax 0x00000045 mov ebx, eax 0x00000047 jmp 00007F6A10989A8Dh 0x00000049 mov ax, 1BE3h 0x0000004d lea esp, dword ptr [esp+02h] 0x00000051 cmp ebp, edx 0x00000053 ja 00007F6A1096FB22h 0x00000059 jmp 00007F6A109897BAh 0x0000005e movzx ebx, byte ptr [esi] 0x00000061 adc dx, di 0x00000064 jne 00007F6A10989A0Eh 0x00000066 call 00007F6A10989B59h 0x0000006b pop edx 0x0000006c mov dx, word ptr [esp] 0x00000070 jmp 00007F6A10989907h 0x00000075 mov eax, dword ptr [esp] 0x00000078 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCAFBB second address: 0000000002CAF028 instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [ebx-00001F34h] 0x00000008 push ebp 0x00000009 jmp 00007F6A1096702Fh 0x0000000e mov byte ptr [esp+02h], dh 0x00000012 setl ah 0x00000015 pushfd 0x00000016 xchg dword ptr [esp+08h], ebx 0x0000001a xchg al, bh 0x0000001c pushad 0x0000001d jmp 00007F6A10966FF8h 0x00000022 mov dh, bl 0x00000024 mov bl, byte ptr [esp] 0x00000027 push dword ptr [esp+28h] 0x0000002b retn 002Ch 0x0000002e dec dh 0x00000030 ja 00007F6A10967401h 0x00000036 btr dx, si 0x0000003a call 00007F6A10966DC5h 0x0000003f pushfd 0x00000040 lea edx, dword ptr [edi+50h] 0x00000043 lea ebx, dword ptr [ebp-00002F6Bh] 0x00000049 mov al, cl 0x0000004b jmp 00007F6A10967072h 0x0000004d mov ah, byte ptr [esp] 0x00000050 push sp 0x00000052 lea esp, dword ptr [esp+02h] 0x00000056 cmp ebp, edx 0x00000058 jnp 00007F6A1096708Eh 0x0000005a jmp 00007F6A109670DEh 0x0000005c not al 0x0000005e bswap ebx 0x00000060 ja 00007F6A1094D65Eh 0x00000066 jmp 00007F6A10966E3Ah 0x0000006b movzx ebx, byte ptr [esi] 0x0000006e adc dx, di 0x00000071 jne 00007F6A1096708Eh 0x00000073 call 00007F6A109671D9h 0x00000078 pop edx 0x00000079 mov dx, word ptr [esp] 0x0000007d jmp 00007F6A10966F87h 0x00000082 mov eax, dword ptr [esp] 0x00000085 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCD172 second address: 0000000002CCD230 instructions: 0x00000000 rdtsc 0x00000002 xchg bx, dx 0x00000005 pushad 0x00000006 push dword ptr [esp+0Dh] 0x0000000a jmp 00007F6A10989ACAh 0x0000000f jo 00007F6A10989A46h 0x00000011 mov ebx, dword ptr [ebp+00h] 0x00000014 pushfd 0x00000015 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D008E0 second address: 0000000002D0094B instructions: 0x00000000 rdtsc 0x00000002 movzx ebx, byte ptr [esi] 0x00000005 sub esp, 0Ah 0x00000008 jmp 00007F6A10967165h 0x0000000d jl 00007F6A10967025h 0x00000013 xchg dword ptr [esp+01h], eax 0x00000017 pop word ptr [esp] 0x0000001b jmp 00007F6A10967075h 0x0000001d mov dx, word ptr [esp] 0x00000021 mov dh, ah 0x00000023 sub esp, 10h 0x00000026 jmp 00007F6A1096707Eh 0x00000028 lea esp, dword ptr [esp+0Fh] 0x0000002c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCA8D4 second address: 0000000002CCAA68 instructions: 0x00000000 rdtsc 0x00000002 mov ebx, 3A160AC8h 0x00000007 jmp 00007F6A1098AF0Ah 0x0000000c shl ah, 00000005h 0x0000000f je 00007F6A10988839h 0x00000015 lea edx, dword ptr [00000000h+eax*4] 0x0000001c jmp 00007F6A10988833h 0x00000021 mov ebx, dword ptr [esi] 0x00000024 jmp 00007F6A1098991Bh 0x00000029 mov ax, D482h 0x0000002d mov dx, word ptr [esp] 0x00000031 lea edx, dword ptr [esp-00005E22h] 0x00000038 sub esi, 04h 0x0000003b rcl dx, 1 0x0000003e jmp 00007F6A1098998Ch 0x00000043 jne 00007F6A10989A63h 0x00000045 mov edx, 302DC918h 0x0000004a neg ah 0x0000004c btr eax, esi 0x0000004f mov edx, esi 0x00000051 mov dword ptr [edx], ebx 0x00000053 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CB0A9F second address: 0000000002CB0AF7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A109672A1h 0x00000007 lea esp, dword ptr [esp+01h] 0x0000000b push dword ptr [esp+20h] 0x0000000f retn 0024h 0x00000012 inc eax 0x00000013 xor dx, 4A5Ch 0x00000018 pop dx 0x0000001a jmp 00007F6A109671A4h 0x0000001f lea esp, dword ptr [esp+02h] 0x00000023 rol bl, 00000000h 0x00000026 xchg dl, al 0x00000028 lea edx, dword ptr [00000000h+eax*4] 0x0000002f not ah 0x00000031 jmp 00007F6A10967073h 0x00000033 btc edx, edx 0x00000036 jbe 00007F6A10967097h 0x00000038 xchg dl, al 0x0000003a jmp 00007F6A109670D1h 0x0000003c dec bl 0x0000003e xchg ax, dx 0x00000040 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC9DB0 second address: 0000000002CC9DF6 instructions: 0x00000000 rdtsc 0x00000002 mov dl, byte ptr [esp] 0x00000005 push dword ptr [esp+1Ch] 0x00000009 retn 0020h 0x0000000c mov edx, edi 0x0000000e jmp 00007F6A10989ACDh 0x00000013 inc dx 0x00000015 jnle 00007F6A10989A18h 0x00000017 not edx 0x00000019 mov edx, dword ptr [esp] 0x0000001c jmp 00007F6A10989A4Ch 0x0000001e not bl 0x00000020 bt edx, eax 0x00000023 jle 00007F6A10989A11h 0x00000025 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D19BC1 second address: 0000000002D19B95 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A10967061h 0x00000004 mov dword ptr [ebp+00h], ebx 0x00000007 jmp 00007F6A10967095h 0x00000009 bswap edx 0x0000000b mov bx, bp 0x0000000e mov bx, word ptr [esp] 0x00000012 call 00007F6A109670DAh 0x00000017 lea edx, dword ptr [esp+edx] 0x0000001a mov bx, si 0x0000001d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CAECF2 second address: 0000000002CAED3A instructions: 0x00000000 rdtsc 0x00000002 setnp bh 0x00000005 btc dx, bx 0x00000009 jmp 00007F6A10989A61h 0x0000000b lea ecx, dword ptr [ecx-00000087h] 0x00000011 mov edx, A9B55FE2h 0x00000016 mov ax, si 0x00000019 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CAED3A second address: 0000000002CAED16 instructions: 0x00000000 rdtsc 0x00000002 xchg dword ptr [esp], ecx 0x00000005 xchg eax, edx 0x00000006 jmp 00007F6A10967086h 0x00000008 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CAED16 second address: 0000000002CAEE1E instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 push dword ptr [esp] 0x00000006 retn 0004h 0x00000009 mov bh, byte ptr [esp] 0x0000000c shr ah, 00000006h 0x0000000f jl 00007F6A10989B89h 0x00000015 cpuid 0x00000017 mov ecx, esi 0x00000019 mov edx, AAC6D270h 0x0000001e xchg eax, ebx 0x0000001f lea eax, dword ptr [ebp+000000F7h] 0x00000025 jmp 00007F6A109899EFh 0x00000027 shr bx, 000Bh 0x0000002b jnp 00007F6A10989A16h 0x0000002d lea eax, dword ptr [00000000h+edx*4] 0x00000034 btc dx, sp 0x00000038 jmp 00007F6A10989BC9h 0x0000003d xchg dh, bh 0x0000003f mov bx, si 0x00000042 mov bx, EE0Ch 0x00000046 jmp 00007F6A1098989Dh 0x0000004b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CB5767 second address: 0000000002CB5830 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F6A109670DCh 0x00000005 pushfd 0x00000006 mov ecx, ebp 0x00000008 bsr bx, dx 0x0000000c jo 00007F6A1096707Fh 0x0000000e mov dx, word ptr [esp] 0x00000012 mov edx, 0D44127Fh 0x00000017 xchg ax, dx 0x00000019 jmp 00007F6A109670C0h 0x0000001b not ebx 0x0000001d push ebp 0x0000001e jmp 00007F6A109670CDh 0x00000020 mov edx, eax 0x00000022 neg dh 0x00000024 jc 00007F6A1096714Fh 0x0000002a jmp 00007F6A10967060h 0x0000002c setb al 0x0000002f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CAEC77 second address: 0000000002CAECF2 instructions: 0x00000000 rdtsc 0x00000002 setns dh 0x00000005 jmp 00007F6A10989A02h 0x00000007 cpuid 0x00000009 bsf di, bx 0x0000000d xchg ch, dh 0x0000000f push dword ptr [esp] 0x00000012 retn 0004h 0x00000015 mov esi, dword ptr [esp+2Ch] 0x00000019 clc 0x0000001a jmp 00007F6A10989A71h 0x0000001c jp 00007F6A10989A46h 0x0000001e mov eax, dword ptr [esp] 0x00000021 bswap eax 0x00000023 jmp 00007F6A1098A0F0h 0x00000028 lea ebp, dword ptr [esp] 0x0000002b bsf cx, sp 0x0000002f jg 00007F6A1098936Eh 0x00000035 lea edi, dword ptr [ebp-21h] 0x00000038 call 00007F6A10989DA8h 0x0000003d inc cx 0x0000003f jmp 00007F6A10989727h 0x00000044 jc 00007F6A10989A67h 0x00000046 jnc 00007F6A10989A65h 0x00000048 sub esp, 000000BCh 0x0000004e mov edi, esp 0x00000050 xchg eax, edx 0x00000051 call 00007F6A10989998h 0x00000056 xchg dl, bl 0x00000058 lea ecx, dword ptr [00000000h+ebx*4] 0x0000005f mov ch, byte ptr [esp] 0x00000062 xchg bl, bh 0x00000064 jmp 00007F6A10989A4Eh 0x00000066 xchg dword ptr [esp], ecx 0x00000069 lea ebx, dword ptr [ebp+00004234h] 0x0000006f mov ax, bx 0x00000072 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CAED5F second address: 0000000002CAEE1E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A1096712Ah 0x00000004 mov bh, A0h 0x00000006 xchg dword ptr [esp], ecx 0x00000009 mov dl, 73h 0x0000000b clc 0x0000000c mov ah, 62h 0x0000000e pushfd 0x0000000f jmp 00007F6A10967063h 0x00000011 mov dx, 6B77h 0x00000015 lea ecx, dword ptr [ecx+000000BDh] 0x0000001b rcl bl, cl 0x0000001d mov dh, byte ptr [esp] 0x00000020 sete bh 0x00000023 neg edx 0x00000025 jmp 00007F6A10967086h 0x00000027 xchg dword ptr [esp+04h], ecx 0x0000002b mov dx, word ptr [esp] 0x0000002f sub esp, 0Ah 0x00000032 jmp 00007F6A109670D1h 0x00000034 lea edx, dword ptr [esp+00003586h] 0x0000003b call 00007F6A109670BFh 0x00000040 lea esp, dword ptr [esp+02h] 0x00000044 push dword ptr [esp+10h] 0x00000048 retn 0014h 0x0000004b mov ecx, esi 0x0000004d mov edx, AAC6D270h 0x00000052 xchg eax, ebx 0x00000053 lea eax, dword ptr [ebp+000000F7h] 0x00000059 jmp 00007F6A1096706Fh 0x0000005b shr bx, 000Bh 0x0000005f jnp 00007F6A10967096h 0x00000061 lea eax, dword ptr [00000000h+edx*4] 0x00000068 btc dx, sp 0x0000006c jmp 00007F6A10967249h 0x00000071 xchg dh, bh 0x00000073 mov bx, si 0x00000076 mov bx, EE0Ch 0x0000007a jmp 00007F6A10966F1Dh 0x0000007f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D00D07 second address: 0000000002D00D09 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD89DA second address: 0000000002CD8A0D instructions: 0x00000000 rdtsc 0x00000002 mov al, 1Bh 0x00000004 jmp 00007F6A109670D3h 0x00000006 mov eax, esi 0x00000008 mov word ptr [eax], bx 0x0000000b mov edx, 5B70B88Ch 0x00000010 mov dl, cl 0x00000012 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D7BD16 second address: 0000000002D7BCB1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A109899C9h 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002DAA66D second address: 0000000002DAA677 instructions: 0x00000000 rdtsc 0x00000002 xchg ah, dh 0x00000004 not eax 0x00000006 push edi 0x00000007 setbe al 0x0000000a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002DAA677 second address: 0000000002DAA657 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A10989A0Eh 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002DAA657 second address: 0000000002DAA6DE instructions: 0x00000000 rdtsc 0x00000002 mov ax, CDD0h 0x00000006 bswap eax 0x00000008 mov ax, cx 0x0000000b mov edi, eax 0x0000000d xchg eax, edx 0x0000000e jmp 00007F6A1096711Eh 0x00000010 pop edi 0x00000011 bswap eax 0x00000013 mov eax, dword ptr [esp] 0x00000016 setp dl 0x00000019 mov edx, edi 0x0000001b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD5830 second address: 0000000002CD592B instructions: 0x00000000 rdtsc 0x00000002 rol ebp, 00000000h 0x00000005 jmp 00007F6A109899F6h 0x00000007 jl 00007F6A10989A46h 0x00000009 bt ebx, eax 0x0000000c mov bl, byte ptr [esp] 0x0000000f bswap edx 0x00000011 mov ax, word ptr [esp] 0x00000015 mov dl, 43h 0x00000017 mov ax, 8824h 0x0000001b clc 0x0000001c jmp 00007F6A10989B7Eh 0x00000021 jc 00007F6A10989965h 0x00000027 jnc 00007F6A1098995Fh 0x0000002d lea esp, dword ptr [esp+04h] 0x00000031 neg ebp 0x00000033 mov bh, byte ptr [esp] 0x00000036 rol al, 00000007h 0x00000039 jmp 00007F6A10989A8Bh 0x0000003b jne 00007F6A10989A4Dh 0x0000003d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD7AB0 second address: 0000000002CD7AB4 instructions: 0x00000000 rdtsc 0x00000002 xchg ah, dh 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CE3D27 second address: 0000000002CE3EB2 instructions: 0x00000000 rdtsc 0x00000002 mov dh, byte ptr [esp] 0x00000005 jmp 00007F6A109899D1h 0x00000007 pushfd 0x00000008 push dword ptr [esp+04h] 0x0000000c retn 0008h 0x0000000f lea esp, dword ptr [esp+03h] 0x00000013 jmp 00007F6A10989ABFh 0x00000018 add esi, 04h 0x0000001b mov ax, word ptr [esp] 0x0000001f setb dh 0x00000022 xchg dl, ah 0x00000024 jmp 00007F6A109899EDh 0x00000026 push edi 0x00000027 mov ah, byte ptr [esp] 0x0000002a xchg edi, eax 0x0000002c push ecx 0x0000002d jmp 00007F6A10989A36h 0x0000002f push esi 0x00000030 xchg bl, al 0x00000032 dec bh 0x00000034 jp 00007F6A10989AAEh 0x00000036 mov ecx, ebx 0x00000038 jmp 00007F6A10989A94h 0x0000003a mov ah, byte ptr [esp] 0x0000003d mov dx, 5C02h 0x00000041 xor dx, 3A64h 0x00000046 jmp 00007F6A10989D77h 0x0000004b jbe 00007F6A10989A9Bh 0x0000004d jnbe 00007F6A10989A99h 0x0000004f push esi 0x00000050 mov esi, 54CE0987h 0x00000055 xor bl, ch 0x00000057 jbe 00007F6A10989853h 0x0000005d ja 00007F6A1098984Dh 0x00000063 call 00007F6A109899B4h 0x00000068 pop edi 0x00000069 jmp 00007F6A109898FBh 0x0000006e lea edi, dword ptr [00000000h+eax*4] 0x00000075 lea eax, dword ptr [00000000h+esi*4] 0x0000007c setle al 0x0000007f inc al 0x00000081 js 00007F6A109899FEh 0x00000083 jns 00007F6A109899FCh 0x00000085 jmp 00007F6A10989B51h 0x0000008a pop edi 0x0000008b mov edx, 9C6E709Dh 0x00000090 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCFAF6 second address: 0000000002CCFCBF instructions: 0x00000000 rdtsc 0x00000002 pop dx 0x00000004 jmp 00007F6A109670E8h 0x00000006 xchg eax, edx 0x00000007 dec ax 0x00000009 jno 00007F6A10967097h 0x0000000b xchg al, ah 0x0000000d mov ax, bp 0x00000010 lea esp, dword ptr [esp+02h] 0x00000014 jmp 00007F6A109670C6h 0x00000016 add bl, 00000011h 0x00000019 mov ax, 9BD1h 0x0000001d mov eax, EC020B0Fh 0x00000022 mov al, byte ptr [esp] 0x00000025 xchg al, ah 0x00000027 jmp 00007F6A1096721Dh 0x0000002c lea edx, dword ptr [ebx-000000E2h] 0x00000032 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCFCBF second address: 0000000002CCFBA8 instructions: 0x00000000 rdtsc 0x00000002 dec bl 0x00000004 mov dl, 6Ah 0x00000006 lea edx, dword ptr [00000000h+eax*4] 0x0000000d jmp 00007F6A1098990Ch 0x00000012 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D208B3 second address: 0000000002D2092A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A109670D0h 0x00000004 sub ebp, 02h 0x00000007 neg ah 0x00000009 jmp 00007F6A109670FEh 0x0000000b jo 00007F6A10967068h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D2092A second address: 0000000002D2094B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A109899E6h 0x00000004 movzx ebx, byte ptr [esi] 0x00000007 sub esp, 0Ah 0x0000000a jmp 00007F6A10989AE5h 0x0000000f jl 00007F6A109899A5h 0x00000015 xchg dword ptr [esp+01h], eax 0x00000019 pop word ptr [esp] 0x0000001d jmp 00007F6A109899F5h 0x0000001f mov dx, word ptr [esp] 0x00000023 mov dh, ah 0x00000025 sub esp, 10h 0x00000028 jmp 00007F6A109899FEh 0x0000002a lea esp, dword ptr [esp+0Fh] 0x0000002e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CEF002 second address: 0000000002CEF00A instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [edi-6350673Ch] 0x00000008 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CEF00A second address: 0000000002CEEDBB instructions: 0x00000000 rdtsc 0x00000002 neg eax 0x00000004 jns 00007F6A10989825h 0x0000000a jmp 00007F6A109899DAh 0x0000000c mov ebx, esi 0x0000000e mov edx, dword ptr [ebx] 0x00000010 mov ah, al 0x00000012 mov eax, dword ptr [esp] 0x00000015 jmp 00007F6A109899CCh 0x00000017 mov bl, byte ptr [esi+04h] 0x0000001a clc 0x0000001b jc 00007F6A10989A16h 0x0000001d mov ah, byte ptr [esp] 0x00000020 jmp 00007F6A10989A14h 0x00000022 call 00007F6A10989A6Bh 0x00000027 mov dword ptr [esp], eax 0x0000002a jmp 00007F6A10989A10h 0x0000002c sub esi, 02h 0x0000002f mov eax, 22755878h 0x00000034 mov ax, 5CECh 0x00000038 mov ah, cl 0x0000003a jmp 00007F6A10989A5Ah 0x0000003c xchg ebx, ecx 0x0000003e lea eax, dword ptr [eax+edi] 0x00000041 lea eax, dword ptr [00000000h+eax*4] 0x00000048 mov ah, byte ptr [esp] 0x0000004b jmp 00007F6A10989A0Bh 0x0000004d shl edx, cl 0x0000004f lea eax, dword ptr [00000000h+edx*4] 0x00000056 push bp 0x00000058 mov byte ptr [esp], bl 0x0000005b jmp 00007F6A10989A73h 0x0000005d lea esp, dword ptr [esp+02h] 0x00000061 xchg ebx, ecx 0x00000063 mov eax, esp 0x00000065 xchg al, ah 0x00000067 lea eax, dword ptr [ebx-000082EAh] 0x0000006d jmp 00007F6A10989A08h 0x0000006f mov dword ptr [esi+04h], edx 0x00000072 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CE9DA4 second address: 0000000002CE9DF6 instructions: 0x00000000 rdtsc 0x00000002 dec ebp 0x00000003 jmp 00007F6A10967033h 0x00000005 mov ax, word ptr [esp] 0x00000009 btc dx, si 0x0000000d jmp 00007F6A109670F8h 0x0000000f jnbe 00007F6A1096706Eh 0x00000011 mov ah, byte ptr [esp] 0x00000014 lea edx, dword ptr [00000000h+eax*4] 0x0000001b mov eax, dword ptr [esp] 0x0000001e add dx, 7A10h 0x00000023 not ah 0x00000025 mov edx, edi 0x00000027 jmp 00007F6A1096714Dh 0x0000002c inc dx 0x0000002e jnle 00007F6A10967098h 0x00000030 not edx 0x00000032 mov edx, dword ptr [esp] 0x00000035 jmp 00007F6A109670CCh 0x00000037 not bl 0x00000039 bt edx, eax 0x0000003c jle 00007F6A10967091h 0x0000003e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CE9DF6 second address: 0000000002CE9EAA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A10989AB9h 0x00000007 setnle dl 0x0000000a setns dl 0x0000000d cmp edx, esi 0x0000000f jmp 00007F6A10989A00h 0x00000011 mov edx, dword ptr [esp] 0x00000014 neg bl 0x00000016 bswap edx 0x00000018 rcl eax, 07h 0x0000001b jmp 00007F6A10989A36h 0x0000001d jnbe 00007F6A10989A0Ah 0x0000001f mov ax, word ptr [esp] 0x00000023 shl edx, 19h 0x00000026 jmp 00007F6A10989A65h 0x00000028 mov edx, dword ptr [esp] 0x0000002b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CE4149 second address: 0000000002CE41B4 instructions: 0x00000000 rdtsc 0x00000002 call 00007F6A1096710Ah 0x00000007 lea edx, dword ptr [ebx+ebp] 0x0000000a mov bx, bp 0x0000000d jmp 00007F6A10967094h 0x0000000f lea ebx, dword ptr [esi-0000FFF0h] 0x00000015 xchg dword ptr [esp], edi 0x00000018 mov eax, 56ACE388h 0x0000001d jmp 00007F6A109670D6h 0x0000001f mov dx, bx 0x00000022 lea edi, dword ptr [edi+23h] 0x00000025 mov al, 71h 0x00000027 not ebx 0x00000029 sub esp, 18h 0x0000002c add esp, 15h 0x0000002f jmp 00007F6A1096708Ah 0x00000031 lea esp, dword ptr [esp+03h] 0x00000035 xchg dword ptr [esp], edi 0x00000038 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CE41B4 second address: 0000000002CD5830 instructions: 0x00000000 rdtsc 0x00000002 dec edx 0x00000003 mov ebx, ecx 0x00000005 mov edx, esp 0x00000007 jmp 00007F6A10989B35h 0x0000000c push dword ptr [esp] 0x0000000f retn 0004h 0x00000012 call 00007F6A10989A18h 0x00000017 pop ax 0x00000019 lea esp, dword ptr [esp+02h] 0x0000001d jmp 00007F6A10989AD4h 0x00000022 mov ebp, dword ptr [esi] 0x00000024 bswap ebx 0x00000026 neg dx 0x00000029 jnle 00007F6A10989A13h 0x0000002b shl bh, 00000000h 0x0000002e mov edx, esi 0x00000030 jmp 00007F6A10989A62h 0x00000032 add esi, 04h 0x00000035 dec bx 0x00000037 jnbe 00007F6A10989A15h 0x00000039 lea ebx, dword ptr [05B59A4Ah] 0x0000003f call 00007F6A10989A53h 0x00000044 jmp 00007F6A1097AF8Eh 0x00000049 mov ecx, ebp 0x0000004b bsr bx, dx 0x0000004f jo 00007F6A109899FFh 0x00000051 mov dx, word ptr [esp] 0x00000055 mov edx, 0D44127Fh 0x0000005a xchg ax, dx 0x0000005c jmp 00007F6A10989A40h 0x0000005e not ebx 0x00000060 push ebp 0x00000061 jmp 00007F6A10989A4Dh 0x00000063 mov edx, eax 0x00000065 neg dh 0x00000067 jc 00007F6A10989ACFh 0x0000006d jmp 00007F6A109899E0h 0x0000006f setb al 0x00000072 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CE0342 second address: 0000000002CE0373 instructions: 0x00000000 rdtsc 0x00000002 xchg bl, dl 0x00000004 clc 0x00000005 jo 00007F6A109670C7h 0x00000007 jno 00007F6A109670C5h 0x00000009 push ebp 0x0000000a jmp 00007F6A109670B6h 0x0000000c lea ebp, dword ptr [ebx+000000F6h] 0x00000012 lea ecx, dword ptr [edx-6BD77D8Ah] 0x00000018 mov ebx, edi 0x0000001a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CE9D23 second address: 0000000002CE9DF6 instructions: 0x00000000 rdtsc 0x00000002 call 00007F6A109899DFh 0x00000007 mov dl, CCh 0x00000009 mov eax, dword ptr [esp] 0x0000000c mov eax, dword ptr [esp] 0x0000000f lea edx, dword ptr [esp+ebp] 0x00000012 jmp 00007F6A10989A0Fh 0x00000014 xchg dword ptr [esp], ebp 0x00000017 sub esp, 0Eh 0x0000001a stc 0x0000001b call 00007F6A10989A62h 0x00000020 lea eax, dword ptr [esp+eax] 0x00000023 push dword ptr [esp+11h] 0x00000027 lea esp, dword ptr [esp+02h] 0x0000002b jmp 00007F6A10989A0Fh 0x0000002d lea ebp, dword ptr [ebp+7Ch] 0x00000030 push sp 0x00000032 rcl eax, cl 0x00000034 mov dh, byte ptr [esp] 0x00000037 xchg dh, dl 0x00000039 lea esp, dword ptr [esp+02h] 0x0000003d jmp 00007F6A10989A43h 0x0000003f xchg dword ptr [esp+14h], ebp 0x00000043 mov dl, byte ptr [esp] 0x00000046 xchg dh, dl 0x00000048 mov ah, 8Dh 0x0000004a push dword ptr [esp+14h] 0x0000004e retn 0018h 0x00000051 dec ebp 0x00000052 jmp 00007F6A109899B3h 0x00000054 mov ax, word ptr [esp] 0x00000058 btc dx, si 0x0000005c jmp 00007F6A10989A78h 0x0000005e jnbe 00007F6A109899EEh 0x00000060 mov ah, byte ptr [esp] 0x00000063 lea edx, dword ptr [00000000h+eax*4] 0x0000006a mov eax, dword ptr [esp] 0x0000006d add dx, 7A10h 0x00000072 not ah 0x00000074 mov edx, edi 0x00000076 jmp 00007F6A10989ACDh 0x0000007b inc dx 0x0000007d jnle 00007F6A10989A18h 0x0000007f not edx 0x00000081 mov edx, dword ptr [esp] 0x00000084 jmp 00007F6A10989A4Ch 0x00000086 not bl 0x00000088 bt edx, eax 0x0000008b jle 00007F6A10989A11h 0x0000008d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CE9027 second address: 0000000002CE9124 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [00000000h+esi*4] 0x00000009 xchg dword ptr [esp+18h], ecx 0x0000000d xchg dh, ah 0x0000000f dec ah 0x00000011 call 00007F6A10967083h 0x00000016 lea esp, dword ptr [esp+02h] 0x0000001a jmp 00007F6A109670F4h 0x0000001c lea esp, dword ptr [esp+02h] 0x00000020 push dword ptr [esp+18h] 0x00000024 retn 001Ch 0x00000027 mov ebx, dword ptr [ebp+00h] 0x0000002a bt dx, sp 0x0000002e jnc 00007F6A10967104h 0x00000030 jc 00007F6A1096712Eh 0x00000032 and edx, FD9B4CC2h 0x00000038 bsr ax, si 0x0000003c lea eax, dword ptr [edx+ebp] 0x0000003f jmp 00007F6A109670C4h 0x00000041 mov dl, byte ptr [ebp+04h] 0x00000044 lea eax, dword ptr [00000000h+eax*4] 0x0000004b mov eax, esi 0x0000004d sub ebp, 02h 0x00000050 jmp 00007F6A1096722Eh 0x00000055 shr eax, cl 0x00000057 jc 00007F6A10967032h 0x00000059 bt ax, si 0x0000005d ror ah, cl 0x0000005f and ax, ax 0x00000062 jmp 00007F6A10966F7Fh 0x00000067 xchg edx, ecx 0x00000069 not ax 0x0000006c jmp 00007F6A1096707Eh 0x0000006e shl ebx, cl 0x00000070 not eax 0x00000072 mov al, byte ptr [esp] 0x00000075 mov ax, word ptr [esp] 0x00000079 xchg edx, ecx 0x0000007b jmp 00007F6A109670B6h 0x0000007d mov ax, 3D73h 0x00000081 jmp 00007F6A10967120h 0x00000083 mov dword ptr [ebp+04h], ebx 0x00000086 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CE9124 second address: 0000000002CCF028 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [ecx+ecx] 0x00000005 xchg dl, ah 0x00000007 setbe al 0x0000000a jmp 00007F6A109899E6h 0x0000000c pushfd 0x0000000d pop dword ptr [ebp+00h] 0x00000010 lea eax, dword ptr [00000000h+eax*4] 0x00000017 mov ebx, dword ptr [esp] 0x0000001a jmp 00007F6A10989A0Ch 0x0000001c lea ebx, dword ptr [ecx+000000BAh] 0x00000022 mov dx, word ptr [esp] 0x00000026 jmp 00007F6A10989A62h 0x00000028 mov dx, di 0x0000002b mov bl, CCh 0x0000002d sub esp, 13h 0x00000030 jnc 00007F6A10989A12h 0x00000032 jmp 00007F6A10989A82h 0x00000034 push word ptr [esp+0Dh] 0x00000039 lea esp, dword ptr [esp+01h] 0x0000003d lea edx, dword ptr [edi+50h] 0x00000040 lea ebx, dword ptr [edi+17h] 0x00000043 push ax 0x00000045 mov ebx, eax 0x00000047 jmp 00007F6A10989A8Dh 0x00000049 mov ax, 1BE3h 0x0000004d lea esp, dword ptr [esp+02h] 0x00000051 cmp ebp, edx 0x00000053 ja 00007F6A1096FB22h 0x00000059 jmp 00007F6A109897BAh 0x0000005e movzx ebx, byte ptr [esi] 0x00000061 adc dx, di 0x00000064 jne 00007F6A10989A0Eh 0x00000066 call 00007F6A10989B59h 0x0000006b pop edx 0x0000006c mov dx, word ptr [esp] 0x00000070 jmp 00007F6A10989907h 0x00000075 mov eax, dword ptr [esp] 0x00000078 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CEAFBB second address: 0000000002CCF028 instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [ebx-00001F34h] 0x00000008 push ebp 0x00000009 jmp 00007F6A1096702Fh 0x0000000e mov byte ptr [esp+02h], dh 0x00000012 setl ah 0x00000015 pushfd 0x00000016 xchg dword ptr [esp+08h], ebx 0x0000001a xchg al, bh 0x0000001c pushad 0x0000001d jmp 00007F6A10966FF8h 0x00000022 mov dh, bl 0x00000024 mov bl, byte ptr [esp] 0x00000027 push dword ptr [esp+28h] 0x0000002b retn 002Ch 0x0000002e dec dh 0x00000030 ja 00007F6A10967401h 0x00000036 btr dx, si 0x0000003a call 00007F6A10966DC5h 0x0000003f pushfd 0x00000040 lea edx, dword ptr [edi+50h] 0x00000043 lea ebx, dword ptr [ebp-00002F6Bh] 0x00000049 mov al, cl 0x0000004b jmp 00007F6A10967072h 0x0000004d mov ah, byte ptr [esp] 0x00000050 push sp 0x00000052 lea esp, dword ptr [esp+02h] 0x00000056 cmp ebp, edx 0x00000058 jnp 00007F6A1096708Eh 0x0000005a jmp 00007F6A109670DEh 0x0000005c not al 0x0000005e bswap ebx 0x00000060 ja 00007F6A1094D65Eh 0x00000066 jmp 00007F6A10966E3Ah 0x0000006b movzx ebx, byte ptr [esi] 0x0000006e adc dx, di 0x00000071 jne 00007F6A1096708Eh 0x00000073 call 00007F6A109671D9h 0x00000078 pop edx 0x00000079 mov dx, word ptr [esp] 0x0000007d jmp 00007F6A10966F87h 0x00000082 mov eax, dword ptr [esp] 0x00000085 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CED172 second address: 0000000002CED230 instructions: 0x00000000 rdtsc 0x00000002 xchg bx, dx 0x00000005 pushad 0x00000006 push dword ptr [esp+0Dh] 0x0000000a jmp 00007F6A10989ACAh 0x0000000f jo 00007F6A10989A46h 0x00000011 mov ebx, dword ptr [ebp+00h] 0x00000014 pushfd 0x00000015 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D208E0 second address: 0000000002D2094B instructions: 0x00000000 rdtsc 0x00000002 movzx ebx, byte ptr [esi] 0x00000005 sub esp, 0Ah 0x00000008 jmp 00007F6A10967165h 0x0000000d jl 00007F6A10967025h 0x00000013 xchg dword ptr [esp+01h], eax 0x00000017 pop word ptr [esp] 0x0000001b jmp 00007F6A10967075h 0x0000001d mov dx, word ptr [esp] 0x00000021 mov dh, ah 0x00000023 sub esp, 10h 0x00000026 jmp 00007F6A1096707Eh 0x00000028 lea esp, dword ptr [esp+0Fh] 0x0000002c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CEA8D4 second address: 0000000002CEAA68 instructions: 0x00000000 rdtsc 0x00000002 mov ebx, 3A160AC8h 0x00000007 jmp 00007F6A1098AF0Ah 0x0000000c shl ah, 00000005h 0x0000000f je 00007F6A10988839h 0x00000015 lea edx, dword ptr [00000000h+eax*4] 0x0000001c jmp 00007F6A10988833h 0x00000021 mov ebx, dword ptr [esi] 0x00000024 jmp 00007F6A1098991Bh 0x00000029 mov ax, D482h 0x0000002d mov dx, word ptr [esp] 0x00000031 lea edx, dword ptr [esp-00005E22h] 0x00000038 sub esi, 04h 0x0000003b rcl dx, 1 0x0000003e jmp 00007F6A1098998Ch 0x00000043 jne 00007F6A10989A63h 0x00000045 mov edx, 302DC918h 0x0000004a neg ah 0x0000004c btr eax, esi 0x0000004f mov edx, esi 0x00000051 mov dword ptr [edx], ebx 0x00000053 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD0A9F second address: 0000000002CD0AF7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A109672A1h 0x00000007 lea esp, dword ptr [esp+01h] 0x0000000b push dword ptr [esp+20h] 0x0000000f retn 0024h 0x00000012 inc eax 0x00000013 xor dx, 4A5Ch 0x00000018 pop dx 0x0000001a jmp 00007F6A109671A4h 0x0000001f lea esp, dword ptr [esp+02h] 0x00000023 rol bl, 00000000h 0x00000026 xchg dl, al 0x00000028 lea edx, dword ptr [00000000h+eax*4] 0x0000002f not ah 0x00000031 jmp 00007F6A10967073h 0x00000033 btc edx, edx 0x00000036 jbe 00007F6A10967097h 0x00000038 xchg dl, al 0x0000003a jmp 00007F6A109670D1h 0x0000003c dec bl 0x0000003e xchg ax, dx 0x00000040 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CE9DB0 second address: 0000000002CE9DF6 instructions: 0x00000000 rdtsc 0x00000002 mov dl, byte ptr [esp] 0x00000005 push dword ptr [esp+1Ch] 0x00000009 retn 0020h 0x0000000c mov edx, edi 0x0000000e jmp 00007F6A10989ACDh 0x00000013 inc dx 0x00000015 jnle 00007F6A10989A18h 0x00000017 not edx 0x00000019 mov edx, dword ptr [esp] 0x0000001c jmp 00007F6A10989A4Ch 0x0000001e not bl 0x00000020 bt edx, eax 0x00000023 jle 00007F6A10989A11h 0x00000025 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D39BC1 second address: 0000000002D39B95 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A10967061h 0x00000004 mov dword ptr [ebp+00h], ebx 0x00000007 jmp 00007F6A10967095h 0x00000009 bswap edx 0x0000000b mov bx, bp 0x0000000e mov bx, word ptr [esp] 0x00000012 call 00007F6A109670DAh 0x00000017 lea edx, dword ptr [esp+edx] 0x0000001a mov bx, si 0x0000001d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCECF2 second address: 0000000002CCED3A instructions: 0x00000000 rdtsc 0x00000002 setnp bh 0x00000005 btc dx, bx 0x00000009 jmp 00007F6A10989A61h 0x0000000b lea ecx, dword ptr [ecx-00000087h] 0x00000011 mov edx, A9B55FE2h 0x00000016 mov ax, si 0x00000019 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCED3A second address: 0000000002CCED16 instructions: 0x00000000 rdtsc 0x00000002 xchg dword ptr [esp], ecx 0x00000005 xchg eax, edx 0x00000006 jmp 00007F6A10967086h 0x00000008 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCED16 second address: 0000000002CCEE1E instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 push dword ptr [esp] 0x00000006 retn 0004h 0x00000009 mov bh, byte ptr [esp] 0x0000000c shr ah, 00000006h 0x0000000f jl 00007F6A10989B89h 0x00000015 cpuid 0x00000017 mov ecx, esi 0x00000019 mov edx, AAC6D270h 0x0000001e xchg eax, ebx 0x0000001f lea eax, dword ptr [ebp+000000F7h] 0x00000025 jmp 00007F6A109899EFh 0x00000027 shr bx, 000Bh 0x0000002b jnp 00007F6A10989A16h 0x0000002d lea eax, dword ptr [00000000h+edx*4] 0x00000034 btc dx, sp 0x00000038 jmp 00007F6A10989BC9h 0x0000003d xchg dh, bh 0x0000003f mov bx, si 0x00000042 mov bx, EE0Ch 0x00000046 jmp 00007F6A1098989Dh 0x0000004b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD5767 second address: 0000000002CD5830 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F6A109670DCh 0x00000005 pushfd 0x00000006 mov ecx, ebp 0x00000008 bsr bx, dx 0x0000000c jo 00007F6A1096707Fh 0x0000000e mov dx, word ptr [esp] 0x00000012 mov edx, 0D44127Fh 0x00000017 xchg ax, dx 0x00000019 jmp 00007F6A109670C0h 0x0000001b not ebx 0x0000001d push ebp 0x0000001e jmp 00007F6A109670CDh 0x00000020 mov edx, eax 0x00000022 neg dh 0x00000024 jc 00007F6A1096714Fh 0x0000002a jmp 00007F6A10967060h 0x0000002c setb al 0x0000002f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCEC77 second address: 0000000002CCECF2 instructions: 0x00000000 rdtsc 0x00000002 setns dh 0x00000005 jmp 00007F6A10989A02h 0x00000007 cpuid 0x00000009 bsf di, bx 0x0000000d xchg ch, dh 0x0000000f push dword ptr [esp] 0x00000012 retn 0004h 0x00000015 mov esi, dword ptr [esp+2Ch] 0x00000019 clc 0x0000001a jmp 00007F6A10989A71h 0x0000001c jp 00007F6A10989A46h 0x0000001e mov eax, dword ptr [esp] 0x00000021 bswap eax 0x00000023 jmp 00007F6A1098A0F0h 0x00000028 lea ebp, dword ptr [esp] 0x0000002b bsf cx, sp 0x0000002f jg 00007F6A1098936Eh 0x00000035 lea edi, dword ptr [ebp-21h] 0x00000038 call 00007F6A10989DA8h 0x0000003d inc cx 0x0000003f jmp 00007F6A10989727h 0x00000044 jc 00007F6A10989A67h 0x00000046 jnc 00007F6A10989A65h 0x00000048 sub esp, 000000BCh 0x0000004e mov edi, esp 0x00000050 xchg eax, edx 0x00000051 call 00007F6A10989998h 0x00000056 xchg dl, bl 0x00000058 lea ecx, dword ptr [00000000h+ebx*4] 0x0000005f mov ch, byte ptr [esp] 0x00000062 xchg bl, bh 0x00000064 jmp 00007F6A10989A4Eh 0x00000066 xchg dword ptr [esp], ecx 0x00000069 lea ebx, dword ptr [ebp+00004234h] 0x0000006f mov ax, bx 0x00000072 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CCED5F second address: 0000000002CCEE1E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A1096712Ah 0x00000004 mov bh, A0h 0x00000006 xchg dword ptr [esp], ecx 0x00000009 mov dl, 73h 0x0000000b clc 0x0000000c mov ah, 62h 0x0000000e pushfd 0x0000000f jmp 00007F6A10967063h 0x00000011 mov dx, 6B77h 0x00000015 lea ecx, dword ptr [ecx+000000BDh] 0x0000001b rcl bl, cl 0x0000001d mov dh, byte ptr [esp] 0x00000020 sete bh 0x00000023 neg edx 0x00000025 jmp 00007F6A10967086h 0x00000027 xchg dword ptr [esp+04h], ecx 0x0000002b mov dx, word ptr [esp] 0x0000002f sub esp, 0Ah 0x00000032 jmp 00007F6A109670D1h 0x00000034 lea edx, dword ptr [esp+00003586h] 0x0000003b call 00007F6A109670BFh 0x00000040 lea esp, dword ptr [esp+02h] 0x00000044 push dword ptr [esp+10h] 0x00000048 retn 0014h 0x0000004b mov ecx, esi 0x0000004d mov edx, AAC6D270h 0x00000052 xchg eax, ebx 0x00000053 lea eax, dword ptr [ebp+000000F7h] 0x00000059 jmp 00007F6A1096706Fh 0x0000005b shr bx, 000Bh 0x0000005f jnp 00007F6A10967096h 0x00000061 lea eax, dword ptr [00000000h+edx*4] 0x00000068 btc dx, sp 0x0000006c jmp 00007F6A10967249h 0x00000071 xchg dh, bh 0x00000073 mov bx, si 0x00000076 mov bx, EE0Ch 0x0000007a jmp 00007F6A10966F1Dh 0x0000007f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC5830 second address: 0000000002CC592B instructions: 0x00000000 rdtsc 0x00000002 rol ebp, 00000000h 0x00000005 jmp 00007F6A109899F6h 0x00000007 jl 00007F6A10989A46h 0x00000009 bt ebx, eax 0x0000000c mov bl, byte ptr [esp] 0x0000000f bswap edx 0x00000011 mov ax, word ptr [esp] 0x00000015 mov dl, 43h 0x00000017 mov ax, 8824h 0x0000001b clc 0x0000001c jmp 00007F6A10989B7Eh 0x00000021 jc 00007F6A10989965h 0x00000027 jnc 00007F6A1098995Fh 0x0000002d lea esp, dword ptr [esp+04h] 0x00000031 neg ebp 0x00000033 mov bh, byte ptr [esp] 0x00000036 rol al, 00000007h 0x00000039 jmp 00007F6A10989A8Bh 0x0000003b jne 00007F6A10989A4Dh 0x0000003d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC7AB0 second address: 0000000002CC7AB4 instructions: 0x00000000 rdtsc 0x00000002 xchg ah, dh 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD3D27 second address: 0000000002CD3EB2 instructions: 0x00000000 rdtsc 0x00000002 mov dh, byte ptr [esp] 0x00000005 jmp 00007F6A109899D1h 0x00000007 pushfd 0x00000008 push dword ptr [esp+04h] 0x0000000c retn 0008h 0x0000000f lea esp, dword ptr [esp+03h] 0x00000013 jmp 00007F6A10989ABFh 0x00000018 add esi, 04h 0x0000001b mov ax, word ptr [esp] 0x0000001f setb dh 0x00000022 xchg dl, ah 0x00000024 jmp 00007F6A109899EDh 0x00000026 push edi 0x00000027 mov ah, byte ptr [esp] 0x0000002a xchg edi, eax 0x0000002c push ecx 0x0000002d jmp 00007F6A10989A36h 0x0000002f push esi 0x00000030 xchg bl, al 0x00000032 dec bh 0x00000034 jp 00007F6A10989AAEh 0x00000036 mov ecx, ebx 0x00000038 jmp 00007F6A10989A94h 0x0000003a mov ah, byte ptr [esp] 0x0000003d mov dx, 5C02h 0x00000041 xor dx, 3A64h 0x00000046 jmp 00007F6A10989D77h 0x0000004b jbe 00007F6A10989A9Bh 0x0000004d jnbe 00007F6A10989A99h 0x0000004f push esi 0x00000050 mov esi, 54CE0987h 0x00000055 xor bl, ch 0x00000057 jbe 00007F6A10989853h 0x0000005d ja 00007F6A1098984Dh 0x00000063 call 00007F6A109899B4h 0x00000068 pop edi 0x00000069 jmp 00007F6A109898FBh 0x0000006e lea edi, dword ptr [00000000h+eax*4] 0x00000075 lea eax, dword ptr [00000000h+esi*4] 0x0000007c setle al 0x0000007f inc al 0x00000081 js 00007F6A109899FEh 0x00000083 jns 00007F6A109899FCh 0x00000085 jmp 00007F6A10989B51h 0x0000008a pop edi 0x0000008b mov edx, 9C6E709Dh 0x00000090 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CBFAF6 second address: 0000000002CBFCBF instructions: 0x00000000 rdtsc 0x00000002 pop dx 0x00000004 jmp 00007F6A109670E8h 0x00000006 xchg eax, edx 0x00000007 dec ax 0x00000009 jno 00007F6A10967097h 0x0000000b xchg al, ah 0x0000000d mov ax, bp 0x00000010 lea esp, dword ptr [esp+02h] 0x00000014 jmp 00007F6A109670C6h 0x00000016 add bl, 00000011h 0x00000019 mov ax, 9BD1h 0x0000001d mov eax, EC020B0Fh 0x00000022 mov al, byte ptr [esp] 0x00000025 xchg al, ah 0x00000027 jmp 00007F6A1096721Dh 0x0000002c lea edx, dword ptr [ebx-000000E2h] 0x00000032 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CBFCBF second address: 0000000002CBFBA8 instructions: 0x00000000 rdtsc 0x00000002 dec bl 0x00000004 mov dl, 6Ah 0x00000006 lea edx, dword ptr [00000000h+eax*4] 0x0000000d jmp 00007F6A1098990Ch 0x00000012 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D108B3 second address: 0000000002D1092A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A109670D0h 0x00000004 sub ebp, 02h 0x00000007 neg ah 0x00000009 jmp 00007F6A109670FEh 0x0000000b jo 00007F6A10967068h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1092A second address: 0000000002D1094B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A109899E6h 0x00000004 movzx ebx, byte ptr [esi] 0x00000007 sub esp, 0Ah 0x0000000a jmp 00007F6A10989AE5h 0x0000000f jl 00007F6A109899A5h 0x00000015 xchg dword ptr [esp+01h], eax 0x00000019 pop word ptr [esp] 0x0000001d jmp 00007F6A109899F5h 0x0000001f mov dx, word ptr [esp] 0x00000023 mov dh, ah 0x00000025 sub esp, 10h 0x00000028 jmp 00007F6A109899FEh 0x0000002a lea esp, dword ptr [esp+0Fh] 0x0000002e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CDF002 second address: 0000000002CDF00A instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [edi-6350673Ch] 0x00000008 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CDF00A second address: 0000000002CDEDBB instructions: 0x00000000 rdtsc 0x00000002 neg eax 0x00000004 jns 00007F6A10989825h 0x0000000a jmp 00007F6A109899DAh 0x0000000c mov ebx, esi 0x0000000e mov edx, dword ptr [ebx] 0x00000010 mov ah, al 0x00000012 mov eax, dword ptr [esp] 0x00000015 jmp 00007F6A109899CCh 0x00000017 mov bl, byte ptr [esi+04h] 0x0000001a clc 0x0000001b jc 00007F6A10989A16h 0x0000001d mov ah, byte ptr [esp] 0x00000020 jmp 00007F6A10989A14h 0x00000022 call 00007F6A10989A6Bh 0x00000027 mov dword ptr [esp], eax 0x0000002a jmp 00007F6A10989A10h 0x0000002c sub esi, 02h 0x0000002f mov eax, 22755878h 0x00000034 mov ax, 5CECh 0x00000038 mov ah, cl 0x0000003a jmp 00007F6A10989A5Ah 0x0000003c xchg ebx, ecx 0x0000003e lea eax, dword ptr [eax+edi] 0x00000041 lea eax, dword ptr [00000000h+eax*4] 0x00000048 mov ah, byte ptr [esp] 0x0000004b jmp 00007F6A10989A0Bh 0x0000004d shl edx, cl 0x0000004f lea eax, dword ptr [00000000h+edx*4] 0x00000056 push bp 0x00000058 mov byte ptr [esp], bl 0x0000005b jmp 00007F6A10989A73h 0x0000005d lea esp, dword ptr [esp+02h] 0x00000061 xchg ebx, ecx 0x00000063 mov eax, esp 0x00000065 xchg al, ah 0x00000067 lea eax, dword ptr [ebx-000082EAh] 0x0000006d jmp 00007F6A10989A08h 0x0000006f mov dword ptr [esi+04h], edx 0x00000072 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD9DA4 second address: 0000000002CD9DF6 instructions: 0x00000000 rdtsc 0x00000002 dec ebp 0x00000003 jmp 00007F6A10967033h 0x00000005 mov ax, word ptr [esp] 0x00000009 btc dx, si 0x0000000d jmp 00007F6A109670F8h 0x0000000f jnbe 00007F6A1096706Eh 0x00000011 mov ah, byte ptr [esp] 0x00000014 lea edx, dword ptr [00000000h+eax*4] 0x0000001b mov eax, dword ptr [esp] 0x0000001e add dx, 7A10h 0x00000023 not ah 0x00000025 mov edx, edi 0x00000027 jmp 00007F6A1096714Dh 0x0000002c inc dx 0x0000002e jnle 00007F6A10967098h 0x00000030 not edx 0x00000032 mov edx, dword ptr [esp] 0x00000035 jmp 00007F6A109670CCh 0x00000037 not bl 0x00000039 bt edx, eax 0x0000003c jle 00007F6A10967091h 0x0000003e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD9DF6 second address: 0000000002CD9EAA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A10989AB9h 0x00000007 setnle dl 0x0000000a setns dl 0x0000000d cmp edx, esi 0x0000000f jmp 00007F6A10989A00h 0x00000011 mov edx, dword ptr [esp] 0x00000014 neg bl 0x00000016 bswap edx 0x00000018 rcl eax, 07h 0x0000001b jmp 00007F6A10989A36h 0x0000001d jnbe 00007F6A10989A0Ah 0x0000001f mov ax, word ptr [esp] 0x00000023 shl edx, 19h 0x00000026 jmp 00007F6A10989A65h 0x00000028 mov edx, dword ptr [esp] 0x0000002b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD4149 second address: 0000000002CD41B4 instructions: 0x00000000 rdtsc 0x00000002 call 00007F6A1096710Ah 0x00000007 lea edx, dword ptr [ebx+ebp] 0x0000000a mov bx, bp 0x0000000d jmp 00007F6A10967094h 0x0000000f lea ebx, dword ptr [esi-0000FFF0h] 0x00000015 xchg dword ptr [esp], edi 0x00000018 mov eax, 56ACE388h 0x0000001d jmp 00007F6A109670D6h 0x0000001f mov dx, bx 0x00000022 lea edi, dword ptr [edi+23h] 0x00000025 mov al, 71h 0x00000027 not ebx 0x00000029 sub esp, 18h 0x0000002c add esp, 15h 0x0000002f jmp 00007F6A1096708Ah 0x00000031 lea esp, dword ptr [esp+03h] 0x00000035 xchg dword ptr [esp], edi 0x00000038 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD41B4 second address: 0000000002CC5830 instructions: 0x00000000 rdtsc 0x00000002 dec edx 0x00000003 mov ebx, ecx 0x00000005 mov edx, esp 0x00000007 jmp 00007F6A10989B35h 0x0000000c push dword ptr [esp] 0x0000000f retn 0004h 0x00000012 call 00007F6A10989A18h 0x00000017 pop ax 0x00000019 lea esp, dword ptr [esp+02h] 0x0000001d jmp 00007F6A10989AD4h 0x00000022 mov ebp, dword ptr [esi] 0x00000024 bswap ebx 0x00000026 neg dx 0x00000029 jnle 00007F6A10989A13h 0x0000002b shl bh, 00000000h 0x0000002e mov edx, esi 0x00000030 jmp 00007F6A10989A62h 0x00000032 add esi, 04h 0x00000035 dec bx 0x00000037 jnbe 00007F6A10989A15h 0x00000039 lea ebx, dword ptr [05B59A4Ah] 0x0000003f call 00007F6A10989A53h 0x00000044 jmp 00007F6A1097AF8Eh 0x00000049 mov ecx, ebp 0x0000004b bsr bx, dx 0x0000004f jo 00007F6A109899FFh 0x00000051 mov dx, word ptr [esp] 0x00000055 mov edx, 0D44127Fh 0x0000005a xchg ax, dx 0x0000005c jmp 00007F6A10989A40h 0x0000005e not ebx 0x00000060 push ebp 0x00000061 jmp 00007F6A10989A4Dh 0x00000063 mov edx, eax 0x00000065 neg dh 0x00000067 jc 00007F6A10989ACFh 0x0000006d jmp 00007F6A109899E0h 0x0000006f setb al 0x00000072 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD0342 second address: 0000000002CD0373 instructions: 0x00000000 rdtsc 0x00000002 xchg bl, dl 0x00000004 clc 0x00000005 jo 00007F6A109670C7h 0x00000007 jno 00007F6A109670C5h 0x00000009 push ebp 0x0000000a jmp 00007F6A109670B6h 0x0000000c lea ebp, dword ptr [ebx+000000F6h] 0x00000012 lea ecx, dword ptr [edx-6BD77D8Ah] 0x00000018 mov ebx, edi 0x0000001a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD9D23 second address: 0000000002CD9DF6 instructions: 0x00000000 rdtsc 0x00000002 call 00007F6A109899DFh 0x00000007 mov dl, CCh 0x00000009 mov eax, dword ptr [esp] 0x0000000c mov eax, dword ptr [esp] 0x0000000f lea edx, dword ptr [esp+ebp] 0x00000012 jmp 00007F6A10989A0Fh 0x00000014 xchg dword ptr [esp], ebp 0x00000017 sub esp, 0Eh 0x0000001a stc 0x0000001b call 00007F6A10989A62h 0x00000020 lea eax, dword ptr [esp+eax] 0x00000023 push dword ptr [esp+11h] 0x00000027 lea esp, dword ptr [esp+02h] 0x0000002b jmp 00007F6A10989A0Fh 0x0000002d lea ebp, dword ptr [ebp+7Ch] 0x00000030 push sp 0x00000032 rcl eax, cl 0x00000034 mov dh, byte ptr [esp] 0x00000037 xchg dh, dl 0x00000039 lea esp, dword ptr [esp+02h] 0x0000003d jmp 00007F6A10989A43h 0x0000003f xchg dword ptr [esp+14h], ebp 0x00000043 mov dl, byte ptr [esp] 0x00000046 xchg dh, dl 0x00000048 mov ah, 8Dh 0x0000004a push dword ptr [esp+14h] 0x0000004e retn 0018h 0x00000051 dec ebp 0x00000052 jmp 00007F6A109899B3h 0x00000054 mov ax, word ptr [esp] 0x00000058 btc dx, si 0x0000005c jmp 00007F6A10989A78h 0x0000005e jnbe 00007F6A109899EEh 0x00000060 mov ah, byte ptr [esp] 0x00000063 lea edx, dword ptr [00000000h+eax*4] 0x0000006a mov eax, dword ptr [esp] 0x0000006d add dx, 7A10h 0x00000072 not ah 0x00000074 mov edx, edi 0x00000076 jmp 00007F6A10989ACDh 0x0000007b inc dx 0x0000007d jnle 00007F6A10989A18h 0x0000007f not edx 0x00000081 mov edx, dword ptr [esp] 0x00000084 jmp 00007F6A10989A4Ch 0x00000086 not bl 0x00000088 bt edx, eax 0x0000008b jle 00007F6A10989A11h 0x0000008d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD9027 second address: 0000000002CD9124 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [00000000h+esi*4] 0x00000009 xchg dword ptr [esp+18h], ecx 0x0000000d xchg dh, ah 0x0000000f dec ah 0x00000011 call 00007F6A10967083h 0x00000016 lea esp, dword ptr [esp+02h] 0x0000001a jmp 00007F6A109670F4h 0x0000001c lea esp, dword ptr [esp+02h] 0x00000020 push dword ptr [esp+18h] 0x00000024 retn 001Ch 0x00000027 mov ebx, dword ptr [ebp+00h] 0x0000002a bt dx, sp 0x0000002e jnc 00007F6A10967104h 0x00000030 and edx, FD9B4CC2h 0x00000036 bsr ax, si 0x0000003a lea eax, dword ptr [edx+ebp] 0x0000003d jmp 00007F6A109670F0h 0x0000003f mov dl, byte ptr [ebp+04h] 0x00000042 lea eax, dword ptr [00000000h+eax*4] 0x00000049 mov eax, esi 0x0000004b sub ebp, 02h 0x0000004e jmp 00007F6A1096722Eh 0x00000053 shr eax, cl 0x00000055 jc 00007F6A10967032h 0x00000057 bt ax, si 0x0000005b ror ah, cl 0x0000005d and ax, ax 0x00000060 jmp 00007F6A10966F7Fh 0x00000065 xchg edx, ecx 0x00000067 not ax 0x0000006a jmp 00007F6A1096707Eh 0x0000006c shl ebx, cl 0x0000006e not eax 0x00000070 mov al, byte ptr [esp] 0x00000073 mov ax, word ptr [esp] 0x00000077 xchg edx, ecx 0x00000079 jmp 00007F6A109670B6h 0x0000007b mov ax, 3D73h 0x0000007f jmp 00007F6A10967120h 0x00000081 mov dword ptr [ebp+04h], ebx 0x00000084 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD9124 second address: 0000000002CBF028 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [ecx+ecx] 0x00000005 xchg dl, ah 0x00000007 setbe al 0x0000000a jmp 00007F6A109899E6h 0x0000000c pushfd 0x0000000d pop dword ptr [ebp+00h] 0x00000010 lea eax, dword ptr [00000000h+eax*4] 0x00000017 mov ebx, dword ptr [esp] 0x0000001a jmp 00007F6A10989A0Ch 0x0000001c lea ebx, dword ptr [ecx+000000BAh] 0x00000022 mov dx, word ptr [esp] 0x00000026 jmp 00007F6A10989A62h 0x00000028 mov dx, di 0x0000002b mov bl, CCh 0x0000002d sub esp, 13h 0x00000030 jnc 00007F6A10989A12h 0x00000032 jmp 00007F6A10989A82h 0x00000034 push word ptr [esp+0Dh] 0x00000039 lea esp, dword ptr [esp+01h] 0x0000003d lea edx, dword ptr [edi+50h] 0x00000040 lea ebx, dword ptr [edi+17h] 0x00000043 push ax 0x00000045 mov ebx, eax 0x00000047 jmp 00007F6A10989A8Dh 0x00000049 mov ax, 1BE3h 0x0000004d lea esp, dword ptr [esp+02h] 0x00000051 cmp ebp, edx 0x00000053 ja 00007F6A1096FB22h 0x00000059 jmp 00007F6A109897BAh 0x0000005e movzx ebx, byte ptr [esi] 0x00000061 adc dx, di 0x00000064 jne 00007F6A10989A0Eh 0x00000066 call 00007F6A10989B59h 0x0000006b pop edx 0x0000006c mov dx, word ptr [esp] 0x00000070 jmp 00007F6A10989907h 0x00000075 mov eax, dword ptr [esp] 0x00000078 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CDAFBB second address: 0000000002CBF028 instructions: 0x00000000 rdtsc 0x00000002 lea ebx, dword ptr [ebx-00001F34h] 0x00000008 push ebp 0x00000009 jmp 00007F6A1096702Fh 0x0000000e mov byte ptr [esp+02h], dh 0x00000012 setl ah 0x00000015 pushfd 0x00000016 xchg dword ptr [esp+08h], ebx 0x0000001a xchg al, bh 0x0000001c pushad 0x0000001d jmp 00007F6A10966FF8h 0x00000022 mov dh, bl 0x00000024 mov bl, byte ptr [esp] 0x00000027 push dword ptr [esp+28h] 0x0000002b retn 002Ch 0x0000002e dec dh 0x00000030 ja 00007F6A10967401h 0x00000036 btr dx, si 0x0000003a call 00007F6A10966DC5h 0x0000003f pushfd 0x00000040 lea edx, dword ptr [edi+50h] 0x00000043 lea ebx, dword ptr [ebp-00002F6Bh] 0x00000049 mov al, cl 0x0000004b jmp 00007F6A10967072h 0x0000004d mov ah, byte ptr [esp] 0x00000050 push sp 0x00000052 lea esp, dword ptr [esp+02h] 0x00000056 cmp ebp, edx 0x00000058 jnp 00007F6A1096708Eh 0x0000005a jmp 00007F6A109670DEh 0x0000005c not al 0x0000005e bswap ebx 0x00000060 ja 00007F6A1094D65Eh 0x00000066 jmp 00007F6A10966E3Ah 0x0000006b movzx ebx, byte ptr [esi] 0x0000006e adc dx, di 0x00000071 jne 00007F6A1096708Eh 0x00000073 call 00007F6A109671D9h 0x00000078 pop edx 0x00000079 mov dx, word ptr [esp] 0x0000007d jmp 00007F6A10966F87h 0x00000082 mov eax, dword ptr [esp] 0x00000085 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CDD172 second address: 0000000002CDD230 instructions: 0x00000000 rdtsc 0x00000002 xchg bx, dx 0x00000005 pushad 0x00000006 push dword ptr [esp+0Dh] 0x0000000a jmp 00007F6A10989ACAh 0x0000000f jo 00007F6A10989A46h 0x00000011 mov ebx, dword ptr [ebp+00h] 0x00000014 pushfd 0x00000015 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CDA8D4 second address: 0000000002CDAA68 instructions: 0x00000000 rdtsc 0x00000002 mov ebx, 3A160AC8h 0x00000007 jmp 00007F6A1096858Ah 0x0000000c shl ah, 00000005h 0x0000000f je 00007F6A10965EB9h 0x00000015 lea edx, dword ptr [00000000h+eax*4] 0x0000001c mov ebx, dword ptr [esi] 0x0000001f jmp 00007F6A10966F9Bh 0x00000024 mov ax, D482h 0x00000028 mov dx, word ptr [esp] 0x0000002c lea edx, dword ptr [esp-00005E22h] 0x00000033 sub esi, 04h 0x00000036 rcl dx, 1 0x00000039 jmp 00007F6A1096700Ch 0x0000003e jne 00007F6A109670E3h 0x00000040 mov edx, 302DC918h 0x00000045 neg ah 0x00000047 btr eax, esi 0x0000004a mov edx, esi 0x0000004c mov dword ptr [edx], ebx 0x0000004e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D108E0 second address: 0000000002D1094B instructions: 0x00000000 rdtsc 0x00000002 movzx ebx, byte ptr [esi] 0x00000005 sub esp, 0Ah 0x00000008 jmp 00007F6A10989AE5h 0x0000000d jl 00007F6A109899A5h 0x00000013 xchg dword ptr [esp+01h], eax 0x00000017 pop word ptr [esp] 0x0000001b jmp 00007F6A109899F5h 0x0000001d mov dx, word ptr [esp] 0x00000021 mov dh, ah 0x00000023 sub esp, 10h 0x00000026 jmp 00007F6A109899FEh 0x00000028 lea esp, dword ptr [esp+0Fh] 0x0000002c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC0A9F second address: 0000000002CC0AF7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A109672A1h 0x00000007 lea esp, dword ptr [esp+01h] 0x0000000b push dword ptr [esp+20h] 0x0000000f retn 0024h 0x00000012 inc eax 0x00000013 xor dx, 4A5Ch 0x00000018 pop dx 0x0000001a jmp 00007F6A109671A4h 0x0000001f lea esp, dword ptr [esp+02h] 0x00000023 rol bl, 00000000h 0x00000026 xchg dl, al 0x00000028 lea edx, dword ptr [00000000h+eax*4] 0x0000002f not ah 0x00000031 jmp 00007F6A10967073h 0x00000033 btc edx, edx 0x00000036 jbe 00007F6A10967097h 0x00000038 xchg dl, al 0x0000003a jmp 00007F6A109670D1h 0x0000003c dec bl 0x0000003e xchg ax, dx 0x00000040 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CD9DB0 second address: 0000000002CD9DF6 instructions: 0x00000000 rdtsc 0x00000002 mov dl, byte ptr [esp] 0x00000005 push dword ptr [esp+1Ch] 0x00000009 retn 0020h 0x0000000c mov edx, edi 0x0000000e jmp 00007F6A10989ACDh 0x00000013 inc dx 0x00000015 jnle 00007F6A10989A18h 0x00000017 not edx 0x00000019 mov edx, dword ptr [esp] 0x0000001c jmp 00007F6A10989A4Ch 0x0000001e not bl 0x00000020 bt edx, eax 0x00000023 jle 00007F6A10989A11h 0x00000025 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D29BC1 second address: 0000000002D29B95 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A10967061h 0x00000004 mov dword ptr [ebp+00h], ebx 0x00000007 jmp 00007F6A10967095h 0x00000009 bswap edx 0x0000000b mov bx, bp 0x0000000e mov bx, word ptr [esp] 0x00000012 call 00007F6A109670DAh 0x00000017 lea edx, dword ptr [esp+edx] 0x0000001a mov bx, si 0x0000001d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CBECF2 second address: 0000000002CBED3A instructions: 0x00000000 rdtsc 0x00000002 setnp bh 0x00000005 btc dx, bx 0x00000009 jmp 00007F6A10989A61h 0x0000000b lea ecx, dword ptr [ecx-00000087h] 0x00000011 mov edx, A9B55FE2h 0x00000016 mov ax, si 0x00000019 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CBED3A second address: 0000000002CBED16 instructions: 0x00000000 rdtsc 0x00000002 xchg dword ptr [esp], ecx 0x00000005 xchg eax, edx 0x00000006 jmp 00007F6A10967086h 0x00000008 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CBED16 second address: 0000000002CBEE1E instructions: 0x00000000 rdtsc 0x00000002 clc 0x00000003 push dword ptr [esp] 0x00000006 retn 0004h 0x00000009 mov bh, byte ptr [esp] 0x0000000c shr ah, 00000006h 0x0000000f jl 00007F6A10989B89h 0x00000015 cpuid 0x00000017 mov ecx, esi 0x00000019 mov edx, AAC6D270h 0x0000001e xchg eax, ebx 0x0000001f lea eax, dword ptr [ebp+000000F7h] 0x00000025 jmp 00007F6A109899EFh 0x00000027 shr bx, 000Bh 0x0000002b jnp 00007F6A10989A16h 0x0000002d lea eax, dword ptr [00000000h+edx*4] 0x00000034 btc dx, sp 0x00000038 jmp 00007F6A10989BC9h 0x0000003d xchg dh, bh 0x0000003f mov bx, si 0x00000042 mov bx, EE0Ch 0x00000046 jmp 00007F6A1098989Dh 0x0000004b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CC5767 second address: 0000000002CC5830 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F6A109670DCh 0x00000005 pushfd 0x00000006 mov ecx, ebp 0x00000008 bsr bx, dx 0x0000000c jo 00007F6A1096707Fh 0x0000000e mov dx, word ptr [esp] 0x00000012 mov edx, 0D44127Fh 0x00000017 xchg ax, dx 0x00000019 jmp 00007F6A109670C0h 0x0000001b not ebx 0x0000001d push ebp 0x0000001e jmp 00007F6A109670CDh 0x00000020 mov edx, eax 0x00000022 neg dh 0x00000024 jc 00007F6A1096714Fh 0x0000002a jmp 00007F6A10967060h 0x0000002c setb al 0x0000002f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CBEC77 second address: 0000000002CBECF2 instructions: 0x00000000 rdtsc 0x00000002 setns dh 0x00000005 jmp 00007F6A10989A02h 0x00000007 cpuid 0x00000009 bsf di, bx 0x0000000d xchg ch, dh 0x0000000f push dword ptr [esp] 0x00000012 retn 0004h 0x00000015 mov esi, dword ptr [esp+2Ch] 0x00000019 clc 0x0000001a jmp 00007F6A10989A71h 0x0000001c jp 00007F6A10989A46h 0x0000001e mov eax, dword ptr [esp] 0x00000021 bswap eax 0x00000023 jmp 00007F6A1098A0F0h 0x00000028 lea ebp, dword ptr [esp] 0x0000002b bsf cx, sp 0x0000002f jg 00007F6A1098936Eh 0x00000035 lea edi, dword ptr [ebp-21h] 0x00000038 call 00007F6A10989DA8h 0x0000003d inc cx 0x0000003f jmp 00007F6A10989727h 0x00000044 jc 00007F6A10989A67h 0x00000046 jnc 00007F6A10989A65h 0x00000048 sub esp, 000000BCh 0x0000004e mov edi, esp 0x00000050 xchg eax, edx 0x00000051 call 00007F6A10989998h 0x00000056 xchg dl, bl 0x00000058 lea ecx, dword ptr [00000000h+ebx*4] 0x0000005f mov ch, byte ptr [esp] 0x00000062 xchg bl, bh 0x00000064 jmp 00007F6A10989A4Eh 0x00000066 xchg dword ptr [esp], ecx 0x00000069 lea ebx, dword ptr [ebp+00004234h] 0x0000006f mov ax, bx 0x00000072 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CBED5F second address: 0000000002CBEE1E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A1096712Ah 0x00000004 mov bh, A0h 0x00000006 xchg dword ptr [esp], ecx 0x00000009 mov dl, 73h 0x0000000b clc 0x0000000c mov ah, 62h 0x0000000e pushfd 0x0000000f jmp 00007F6A10967063h 0x00000011 mov dx, 6B77h 0x00000015 lea ecx, dword ptr [ecx+000000BDh] 0x0000001b rcl bl, cl 0x0000001d mov dh, byte ptr [esp] 0x00000020 sete bh 0x00000023 neg edx 0x00000025 jmp 00007F6A10967086h 0x00000027 xchg dword ptr [esp+04h], ecx 0x0000002b mov dx, word ptr [esp] 0x0000002f sub esp, 0Ah 0x00000032 jmp 00007F6A109670D1h 0x00000034 lea edx, dword ptr [esp+00003586h] 0x0000003b call 00007F6A109670BFh 0x00000040 lea esp, dword ptr [esp+02h] 0x00000044 push dword ptr [esp+10h] 0x00000048 retn 0014h 0x0000004b mov ecx, esi 0x0000004d mov edx, AAC6D270h 0x00000052 xchg eax, ebx 0x00000053 lea eax, dword ptr [ebp+000000F7h] 0x00000059 jmp 00007F6A1096706Fh 0x0000005b shr bx, 000Bh 0x0000005f jnp 00007F6A10967096h 0x00000061 lea eax, dword ptr [00000000h+edx*4] 0x00000068 btc dx, sp 0x0000006c jmp 00007F6A10967249h 0x00000071 xchg dh, bh 0x00000073 mov bx, si 0x00000076 mov bx, EE0Ch 0x0000007a jmp 00007F6A10966F1Dh 0x0000007f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D20D07 second address: 0000000002D20D09 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CF89DA second address: 0000000002CF8A0D instructions: 0x00000000 rdtsc 0x00000002 mov al, 1Bh 0x00000004 jmp 00007F6A109670D3h 0x00000006 mov eax, esi 0x00000008 mov word ptr [eax], bx 0x0000000b mov edx, 5B70B88Ch 0x00000010 mov dl, cl 0x00000012 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D10D07 second address: 0000000002D10D09 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002CE89DA second address: 0000000002CE8A0D instructions: 0x00000000 rdtsc 0x00000002 mov al, 1Bh 0x00000004 jmp 00007F6A109670D3h 0x00000006 mov eax, esi 0x00000008 mov word ptr [eax], bx 0x0000000b mov edx, 5B70B88Ch 0x00000010 mov dl, cl 0x00000012 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D9BD16 second address: 0000000002D9BCB1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A109899C9h 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D8BD16 second address: 0000000002D8BCB1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6A10967049h 0x00000004 rdtsc |